2021-05-12 09:54:28 +02:00
|
|
|
use serde::Deserialize;
|
2020-03-14 13:22:30 +01:00
|
|
|
use serde_json::Value;
|
|
|
|
|
|
|
|
use crate::api::EmptyResult;
|
|
|
|
use crate::db::DbConn;
|
|
|
|
use crate::error::MapResult;
|
2021-05-12 09:54:28 +02:00
|
|
|
use crate::util::UpCase;
|
2020-03-14 13:22:30 +01:00
|
|
|
|
2022-05-04 21:13:05 +02:00
|
|
|
use super::{UserOrgStatus, UserOrgType, UserOrganization};
|
2020-03-14 13:22:30 +01:00
|
|
|
|
2020-08-18 17:15:44 +02:00
|
|
|
db_object! {
|
2022-05-04 21:13:05 +02:00
|
|
|
#[derive(Identifiable, Queryable, Insertable, AsChangeset)]
|
2020-08-18 17:15:44 +02:00
|
|
|
#[table_name = "org_policies"]
|
|
|
|
#[primary_key(uuid)]
|
|
|
|
pub struct OrgPolicy {
|
|
|
|
pub uuid: String,
|
|
|
|
pub org_uuid: String,
|
|
|
|
pub atype: i32,
|
|
|
|
pub enabled: bool,
|
|
|
|
pub data: String,
|
|
|
|
}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2022-06-08 19:46:33 +02:00
|
|
|
#[derive(Copy, Clone, Eq, PartialEq, num_derive::FromPrimitive)]
|
2020-03-14 13:22:30 +01:00
|
|
|
pub enum OrgPolicyType {
|
|
|
|
TwoFactorAuthentication = 0,
|
|
|
|
MasterPassword = 1,
|
|
|
|
PasswordGenerator = 2,
|
2021-09-24 17:55:49 +02:00
|
|
|
SingleOrg = 3,
|
2021-01-24 05:50:06 +01:00
|
|
|
// RequireSso = 4, // Not currently supported.
|
|
|
|
PersonalOwnership = 5,
|
2021-03-16 10:07:45 +01:00
|
|
|
DisableSend = 6,
|
2021-05-12 09:54:28 +02:00
|
|
|
SendOptions = 7,
|
|
|
|
}
|
|
|
|
|
|
|
|
// https://github.com/bitwarden/server/blob/master/src/Core/Models/Data/SendOptionsPolicyData.cs
|
|
|
|
#[derive(Deserialize)]
|
|
|
|
#[allow(non_snake_case)]
|
|
|
|
pub struct SendOptionsPolicyData {
|
|
|
|
pub DisableHideEmail: bool,
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
/// Local methods
|
|
|
|
impl OrgPolicy {
|
|
|
|
pub fn new(org_uuid: String, atype: OrgPolicyType, data: String) -> Self {
|
|
|
|
Self {
|
|
|
|
uuid: crate::util::get_uuid(),
|
|
|
|
org_uuid,
|
|
|
|
atype: atype as i32,
|
|
|
|
enabled: false,
|
|
|
|
data,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-01-24 05:50:06 +01:00
|
|
|
pub fn has_type(&self, policy_type: OrgPolicyType) -> bool {
|
|
|
|
self.atype == policy_type as i32
|
|
|
|
}
|
|
|
|
|
2020-03-14 13:22:30 +01:00
|
|
|
pub fn to_json(&self) -> Value {
|
|
|
|
let data_json: Value = serde_json::from_str(&self.data).unwrap_or(Value::Null);
|
|
|
|
json!({
|
|
|
|
"Id": self.uuid,
|
|
|
|
"OrganizationId": self.org_uuid,
|
|
|
|
"Type": self.atype,
|
|
|
|
"Data": data_json,
|
|
|
|
"Enabled": self.enabled,
|
|
|
|
"Object": "policy",
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/// Database methods
|
|
|
|
impl OrgPolicy {
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn save(&self, conn: &DbConn) -> EmptyResult {
|
2020-09-22 12:13:02 +02:00
|
|
|
db_run! { conn:
|
2020-08-18 17:15:44 +02:00
|
|
|
sqlite, mysql {
|
2020-09-22 12:13:02 +02:00
|
|
|
match diesel::replace_into(org_policies::table)
|
2020-08-18 17:15:44 +02:00
|
|
|
.values(OrgPolicyDb::to_db(self))
|
|
|
|
.execute(conn)
|
2020-09-22 12:13:02 +02:00
|
|
|
{
|
|
|
|
Ok(_) => Ok(()),
|
|
|
|
// Record already exists and causes a Foreign Key Violation because replace_into() wants to delete the record first.
|
|
|
|
Err(diesel::result::Error::DatabaseError(diesel::result::DatabaseErrorKind::ForeignKeyViolation, _)) => {
|
|
|
|
diesel::update(org_policies::table)
|
|
|
|
.filter(org_policies::uuid.eq(&self.uuid))
|
|
|
|
.set(OrgPolicyDb::to_db(self))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error saving org_policy")
|
|
|
|
}
|
|
|
|
Err(e) => Err(e.into()),
|
|
|
|
}.map_res("Error saving org_policy")
|
2020-08-18 17:15:44 +02:00
|
|
|
}
|
|
|
|
postgresql {
|
|
|
|
let value = OrgPolicyDb::to_db(self);
|
|
|
|
// We need to make sure we're not going to violate the unique constraint on org_uuid and atype.
|
|
|
|
// This happens automatically on other DBMS backends due to replace_into(). PostgreSQL does
|
|
|
|
// not support multiple constraints on ON CONFLICT clauses.
|
|
|
|
diesel::delete(
|
|
|
|
org_policies::table
|
|
|
|
.filter(org_policies::org_uuid.eq(&self.org_uuid))
|
|
|
|
.filter(org_policies::atype.eq(&self.atype)),
|
|
|
|
)
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting org_policy for insert")?;
|
|
|
|
|
|
|
|
diesel::insert_into(org_policies::table)
|
|
|
|
.values(&value)
|
|
|
|
.on_conflict(org_policies::uuid)
|
|
|
|
.do_update()
|
|
|
|
.set(&value)
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error saving org_policy")
|
|
|
|
}
|
|
|
|
}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn delete(self, conn: &DbConn) -> EmptyResult {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(org_policies::table.filter(org_policies::uuid.eq(self.uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting org_policy")
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn find_by_uuid(uuid: &str, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
org_policies::table
|
|
|
|
.filter(org_policies::uuid.eq(uuid))
|
|
|
|
.first::<OrgPolicyDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn find_by_org(org_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
org_policies::table
|
|
|
|
.filter(org_policies::org_uuid.eq(org_uuid))
|
|
|
|
.load::<OrgPolicyDb>(conn)
|
|
|
|
.expect("Error loading org_policy")
|
|
|
|
.from_db()
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn find_confirmed_by_user(user_uuid: &str, conn: &DbConn) -> Vec<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
org_policies::table
|
2020-11-07 23:01:56 +01:00
|
|
|
.inner_join(
|
2020-08-18 17:15:44 +02:00
|
|
|
users_organizations::table.on(
|
|
|
|
users_organizations::org_uuid.eq(org_policies::org_uuid)
|
|
|
|
.and(users_organizations::user_uuid.eq(user_uuid)))
|
|
|
|
)
|
2020-11-07 23:14:17 +01:00
|
|
|
.filter(
|
|
|
|
users_organizations::status.eq(UserOrgStatus::Confirmed as i32)
|
|
|
|
)
|
2020-08-18 17:15:44 +02:00
|
|
|
.select(org_policies::all_columns)
|
|
|
|
.load::<OrgPolicyDb>(conn)
|
|
|
|
.expect("Error loading org_policy")
|
|
|
|
.from_db()
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn find_by_org_and_type(org_uuid: &str, atype: i32, conn: &DbConn) -> Option<Self> {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
org_policies::table
|
|
|
|
.filter(org_policies::org_uuid.eq(org_uuid))
|
|
|
|
.filter(org_policies::atype.eq(atype))
|
|
|
|
.first::<OrgPolicyDb>(conn)
|
|
|
|
.ok()
|
|
|
|
.from_db()
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn delete_all_by_organization(org_uuid: &str, conn: &DbConn) -> EmptyResult {
|
2020-08-18 17:15:44 +02:00
|
|
|
db_run! { conn: {
|
|
|
|
diesel::delete(org_policies::table.filter(org_policies::org_uuid.eq(org_uuid)))
|
|
|
|
.execute(conn)
|
|
|
|
.map_res("Error deleting org_policy")
|
|
|
|
}}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|
|
|
|
|
2021-03-16 10:07:45 +01:00
|
|
|
/// Returns true if the user belongs to an org that has enabled the specified policy type,
|
|
|
|
/// and the user is not an owner or admin of that org. This is only useful for checking
|
|
|
|
/// applicability of policy types that have these particular semantics.
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn is_applicable_to_user(user_uuid: &str, policy_type: OrgPolicyType, conn: &DbConn) -> bool {
|
2021-09-24 17:55:49 +02:00
|
|
|
// TODO: Should check confirmed and accepted users
|
2021-11-16 17:07:55 +01:00
|
|
|
for policy in OrgPolicy::find_confirmed_by_user(user_uuid, conn).await {
|
2021-03-16 10:07:45 +01:00
|
|
|
if policy.enabled && policy.has_type(policy_type) {
|
|
|
|
let org_uuid = &policy.org_uuid;
|
2021-11-16 17:07:55 +01:00
|
|
|
if let Some(user) = UserOrganization::find_by_user_and_org(user_uuid, org_uuid, conn).await {
|
2021-03-16 10:07:45 +01:00
|
|
|
if user.atype < UserOrgType::Admin {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
false
|
|
|
|
}
|
|
|
|
|
2021-05-12 09:54:28 +02:00
|
|
|
/// Returns true if the user belongs to an org that has enabled the `DisableHideEmail`
|
|
|
|
/// option of the `Send Options` policy, and the user is not an owner or admin of that org.
|
2021-11-16 17:07:55 +01:00
|
|
|
pub async fn is_hide_email_disabled(user_uuid: &str, conn: &DbConn) -> bool {
|
|
|
|
for policy in OrgPolicy::find_confirmed_by_user(user_uuid, conn).await {
|
2021-05-12 09:54:28 +02:00
|
|
|
if policy.enabled && policy.has_type(OrgPolicyType::SendOptions) {
|
|
|
|
let org_uuid = &policy.org_uuid;
|
2021-11-16 17:07:55 +01:00
|
|
|
if let Some(user) = UserOrganization::find_by_user_and_org(user_uuid, org_uuid, conn).await {
|
2021-05-12 09:54:28 +02:00
|
|
|
if user.atype < UserOrgType::Admin {
|
|
|
|
match serde_json::from_str::<UpCase<SendOptionsPolicyData>>(&policy.data) {
|
|
|
|
Ok(opts) => {
|
|
|
|
if opts.data.DisableHideEmail {
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
_ => error!("Failed to deserialize policy data: {}", policy.data),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
false
|
|
|
|
}
|
2020-03-14 13:22:30 +01:00
|
|
|
}
|